Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
81a848027c04a40d816d2e9b0719d9f9_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
81a848027c04a40d816d2e9b0719d9f9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
81a848027c04a40d816d2e9b0719d9f9_JaffaCakes118.html
-
Size
175KB
-
MD5
81a848027c04a40d816d2e9b0719d9f9
-
SHA1
27a38535dc1ed81f4bf5504942b825525e77eb71
-
SHA256
36e1b663fb8def118fdf509cbf11248a66a962f658174f81bda2e691c389f562
-
SHA512
891b289a767d3b930e81942baa4af4332c5de4aa844140c4133897d4b50e171dc5961132355fe81e7ddc7bf585130137521b704436fcbf522964931e26fd9557
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3mGNkFpYfBCJis/+aeTH+WK/Lf1/hmnVSV:SOoT3m/FMBCJirm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1428 msedge.exe 1428 msedge.exe 1876 identity_helper.exe 1876 identity_helper.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 4108 1428 msedge.exe 81 PID 1428 wrote to memory of 4108 1428 msedge.exe 81 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 3152 1428 msedge.exe 82 PID 1428 wrote to memory of 1884 1428 msedge.exe 83 PID 1428 wrote to memory of 1884 1428 msedge.exe 83 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84 PID 1428 wrote to memory of 1376 1428 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81a848027c04a40d816d2e9b0719d9f9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f56546f8,0x7ff8f5654708,0x7ff8f56547182⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 /prefetch:82⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,14931160070064143340,3457286260248237267,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5580 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD59865c2cc40d7e2bf4eacedd4d252b3a2
SHA1ce0f3c2de9d67c85db1f832dc97e96f6944d9633
SHA25624c9a5bc10004c1feafff7ce37d64a5917c75043748744beb8ae8434fd3afa9f
SHA5123aea3476014e3adac1632ca66335360b8fce0a4bb64b10e6b2dbf72e9c036585d2ef94fccdce9244acc5a2ec9fec347197cdacb17a3f52dd4476b55394ef428a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize72B
MD514fdfdf4a356e008602eb90c64c5b285
SHA1b4737ce3b983df9071e106297a572cbe44cb61c4
SHA25670735afb07d20fabc71828469085a71d596739a325d376dd0b992d6582a9f58a
SHA512a35f4d84bdc17a08dadf8cbee28efde48ee1d449f0a5f7af8b504b7f6dfa47fea5c0dd1ba4c99f8e294995b2e1fae5c779135f1155f8ef154b556e33feb5babc
-
Filesize
2KB
MD53935e2344880cde6ddfc2983ffb208f7
SHA1605301cc19bfe9e2dd1a7e427a1117a073b452e5
SHA256ab49b8563057e74e257236e0311247504481be7b29c753e7d018c05b8189253f
SHA512d00a6e84bbaa338ae7b7983f616777c5e17137e45564aad56aa7b0d55514526dd5be3639824bd1b798cab23cd27bc5863bbfcc194d16423a92a8df3d1d898781
-
Filesize
2KB
MD5e134d47123e0c56310461059552a25c2
SHA19a3475f0f8af5a79fa54be6ac8bba6c5a7ac5ee8
SHA256c6da895473660231eec3d79636e61f62a516c2b1106f3ee893b58a09e372e293
SHA5123217c904e3afa3830931fd029fe0ab6003d71ad9ffb585e8f2999a3a71b5536911e31efc9a13bcf4936187993129f0bfe920ba7c0ed0801eae61bc6e319b85ee
-
Filesize
5KB
MD52ca8f1565f8148993d7e9255279236e5
SHA12abade5797c0ffd989bf4df7fee984366306fcdd
SHA25630b56f1eaa5da2539800e4daee95d6b785434e17ce7cd008b04f6026528a2e2c
SHA512ce336b5a20f24be64e77042dfd25bbf9b117ce42f1accc8dc74330cfd40a9cf338a11b047bed2ebed4057019f19ed3005e3d9cca29f5a21d51f22d75ea3c03b7
-
Filesize
7KB
MD571b7945252852819944f44c17f3da965
SHA1552e1edac051a7fed0885b251b449ae4cfa9fe80
SHA256f9aac5ec86671bfb38a62ac5cc3ae423fc156a70e5b1007029ece7de3b2304a1
SHA5121ee771023ba9dc7638c415b36392bb1e885007865565b5a07473767c94961d79f7530d7caa28e4ab4d2d6096667c28bea2fe20140c32bfaabe8e0a43bfb7d6bb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b24390b6388dc87fb95cfe65c6ea642d
SHA1dda563a690767691664babcdc1d0d526412b460a
SHA256a27a86367a8ad27e868a90dc8d9ebdf32750a0d674e5aafd5fc3793e20325445
SHA512af6920bb5ec774b53d478556b5a725c73f79fc2314d131b59380f1f22e7b6fda59c19ab3cf734083f07f8bb1fc0919b651ebc78654fd53685843d0ce788bb4b8